InfoSec Philippines

Information Security, Technology News and Opinions

Posts Tagged ‘Mac’

Hack in The Box Conference 2008 Materials

Posted by Jaime Raphael Licauco, CISSP, GSEC on December 1, 2008


Amitpal Dhillon – Addressing Identity Management.pdf
3.7M


Dino Dai Zovi – Mac OS Xploitation.pdf
623K


Ero Carrera – Analysis and Visualization of Common Packers.pdf
3.7M

Hernan Ochoa – Pass-The-Hash Toolkit for Windows.pdf 535K


Jim Geovedi – Hacking a Bird in the Sky 2.0.pdf
3.1M


Julian Ho – Moocherhunter.pdf
124K


Peter Silberman – Full Process Reconstitution from Memory.pdf
144K


Alexander Tereshkin – Bluepilling the Xen Hypervisor.pdf
8.3M


Alexander Tereshkin – Bluepilling the Xen Hypervisor Demo (Large File)
142M


Eric Lawrence – IE 8 – Engineering a Trustworthy Browser.pdf
13M


Jonathan Squire – A Fox in the Hen House.pdf
3.5M


Paul Craig – Hacking Internet Kiosks.pdf
1.2M


Roberto Preatoni – Time for a Free Hardware Foundation.pdf
11M


Saumil Shah – Browser Exploits – A New Model for Browser Security.pdf
2.1M


The Grugq – How the Leopard Hides His Spots.pdf
01-Nov-2008 12:39 128K


Mel Mudin and Lee – Advanced Network Forensics Lab Demo (Large File)
29M


Charlie Miller – iPwning the iPhone.pdf
9.8M


Charl van Der Walt – Pushing the Camel Through the Eye of a Needle.pdf
23M


Ilfak Guilfanov – Decompilers and Beyond.pdf
418K


Kris Kaspersky – Remote Code Execution Through Intel CPU Bugs.pdf
1.3M


Petko D Petkov – Client Side Security.pdf
1.0M


AR Samhuri – Next Generation Reverse Shell.pdf
7.7M


Adrian Pastor – Cracking into Embedded Devices and Beyond.pdf
889K


Mary Yeoh – Security Penetration Testing at RTL Level.pdf
4.4M


Matthew Geiger – How to Build Your Own Password Cracker and Disassembler.pdf
471K


Shreeraj Shah – Top 10 Web 2.0 Attacks.pdf
1.1M


Advanced Wireless Lab (Very Large File)
1.2G


Ching Tim Meng – Detecting and Removing Malware without Antivirus Software.pdf
321K


KEYNOTE 1 – Jeremiah Grossman – The Art of Click-Jacking.pdf
2.5M


KEYNOTE 2 – Marcus Ranum – Cyberwar is Bullshit.pdf
54K


KEYNOTE 3 + 4 – The Pirate Bay Dissolving a Billion Dollar Industry as a Hobby.zip
38M

Advertisement

Posted in conferences, News, Whitepapers | Tagged: , , , , , , , , , , , , , | Leave a Comment »

Black Hat Japan 2008 Presentations

Posted by Jaime Raphael Licauco, CISSP, GSEC on November 25, 2008

Keynote – Black Ops of DNS 2008 : Its The End Of The Cache As We Know It by Dan Kaminsky

API sysenter hooking by Kenji Aiko

Understanding Targeted Attacks with Office Documents by Bruce Dang

Get Rich or Die Trying – “Making Money on The Web, The Black Hat Way” by Arian Evans

Cyberspace and the Changing Nature of Warfare by Kenneth Geers
Presentation Slides, Whitepaper

Attacking with Character Encoding for Profit and Fun by Yosuke Hasegawa

“FFR EXCALOC” Exploitability by Toshiaki Ishiyama

Threat Gallery of Japanese Landscape by Hiroshi Kawaguchi

The Internet is Broken: Beyond Document.Cookie – Extreme Client Side Exploitation by Nathan McFeters

Owning the Fanboys: Hacking Mac OSX by Charlie Miller

Satan is on My Friends List: SNS Survey by Shawn Moyer & Nathan Hamiel

Exploiting Symbian OS in mobile devices by Collin Mulliner

A Hypervisor IPS based on Hardware Assisted Virtualization Technology by Junichi Murakami
Presentation Slides (EN), Whitepaper

Disclosing Secret Algorithms from Hardware by Karsten Nohl

ePassports Reloaded by Jeroen van Beek

Posted in conferences | Tagged: , , , , , , , , , , , , , , , , , , , , , | Leave a Comment »